SAP Knowledge Base Article - Preview

3273691 - CAP Parser( ) infected with signal 11 with strlcpy() in stack trace - SRS 16.0

Symptom

  • SRS log reports an "infected with signal 11” error  in the thread CAP Parser together with a stack trace:

 Thread CAP Parser( ) infected with signal 11.

  • Stack trace includes the modules strlcpy():

***************STACK TRACE***************
*****thread CAP Parser( )*******
pc: 0x000000000045e8a8 + 0000000000000200, exc__appDumpStack ()
pc: 0x00000000004646d8 + 000000000000048c, exc_terminate ()
pc: 0x00000000001f8c88 + 000000000000092c, sun_svr4_catch_signal ()
pc: 0x7e300000 + 17ae2, strlcpy ()
*****End of stack trace.****
Internal error. Attempting to produce a core file.


Read more...

Environment

  • SAP Replication Server (SRS) 16.0
  • SAP Adaptive Server Enterprise (ASE) 16.0
  • High Availability Disaster Recovery (HADR) 

Keywords

CR823277, CR#823277, 823277, CR#824136, CR824136, 824136, SEGV, segmentation, storage, access, violation, fault, segfault, stacktrace, stacktrc , KBA , BC-SYB-REP , Sybase Replication Server (standalone) , BC-SYB-ASE , Sybase ASE Database Platform (non Business Suite) , Bug Filed

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.